WP Customer Area <= 8.3.4 - Authenticated (Subscriber+) Arbitrary File Read/Deletion via ajax_attach_file
Summary
| CVE | CVE-2026-3464 |
|---|---|
| State | PUBLISHED |
| Assigner | Wordfence |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-17 17:17:07 UTC |
| Updated | 2026-04-22 20:22:50 UTC |
| Description | The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in the 'ajax_attach_file' function in all versions up to, and including, 8.3.4. This makes it possible for authenticated attackers with a role that an administrator grants access to (e.g., Subscriber) to to read the contents of arbitrary files on the server, which can contain sensitive information, or delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). |
Risk And Classification
Primary CVSS: v3.1 8.8 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.002960000 probability, percentile 0.529870000 (date 2026-04-22)
Problem Types: CWE-22 | CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Aguilatechnologies | WP Customer Area | affected 8.3.4 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| plugins.trac.wordpress.org/browser/customer-area/tags/8.3.4/src/php/core-addons/private-... | [email protected] | plugins.trac.wordpress.org | |
| www.wordfence.com/threat-intel/vulnerabilities/id/aadf1f4c-c852-4167-9b09-7e679... | [email protected] | www.wordfence.com | |
| plugins.trac.wordpress.org/browser/customer-area/tags/8.3.4/src/php/core-addons/private-... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/changeset/3507868/customer-area | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/customer-area/tags/8.3.4/src/php/core-addons/private-... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/customer-area/tags/8.3.4/src/php/core-addons/private-... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/customer-area/tags/8.3.4/src/php/core-addons/private-... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/customer-area/tags/8.3.4/src/php/core-addons/private-... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/customer-area/tags/8.3.4/src/js/common/files/ftp-uplo... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/customer-area/tags/8.3.4/src/php/core-addons/private-... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/customer-area/tags/8.3.4/src/js/common/files/file-att... | [email protected] | plugins.trac.wordpress.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Angus Girvan (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-04-17T04:24:04.000Z | Disclosed |
There are currently no legacy QID mappings associated with this CVE.